Cyberattacks attributed to foreign governments have been on the rise for years, many against organizations all over the world. These attacks try to steal online account information, infect computers, and compromise the safety of networks. Targets of these attacks include think tanks, university staff, government employees, and even members of organizations focused on human rights issues.

As these attacks increase in prevalence and sophistication, organizations are taking notice of the threats posed by hostile state actors and state-sponsored cybercriminal groups.

So, how can businesses protect against them?

Join today's episode of The (Security) Balancing Act with Diana Kelley to learn whether your business should be concerned about nation state attacks and what to do about it.

The topics up for discussion will include:
- State actors & rise in cyber crime
- How the attackers get in
- A review of recent nation-state campaigns
- How does this impact organizations across different verticals (Financial vs Healthcare vs Government)
- How industry and law enforcement are responding to these attacks
- How AI and ML may change cybercriminal tactics
- How to deal with threats from criminals and hostile states

We welcome viewer participation and questions during this interactive panel session.

As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:

-Why your organisation needs to move towards SEaaS
-The different models of security as a service
- SEaaS solutions and strategies

Remote working has been a growing trend for the last few years, especially in the tech sector. However, the COVID19 outbreak has really pushed businesses to adopt or accelerate their remote integration plans. How has this affected security? What are the steps companies need to take to better protect their remote workforce?

Join this episode as we explore the security challenges in the time of COVID, why a strong security culture is important, and what steps to take today.
- What are the security challenges associated with remote working
- Examples of changes in cyber-attacks during COVID
- Managing patching, VPNs, and backups for large and small remote workforces
- How to maintain auditability and visibility
- How to enable and keep your remote team secure
- ​Tips for training end users to help themselves
- Why a strong security culture matters now more than ever

Join Keyaan Williams, Founder and Managing Director of Cyber Leadership and Strategy Solutions, LLC (CLASS-LLC), to discuss how to build, test, and manage an end user training program to strengthen your overall security posture.

This Election Hacking episode will explore the recent wave of SIM swap attacks in the context of MFA compromise, account hijacking and data theft ahead of the 2020 election.

Can SIM swapping be used to target and steal identities of high-value individuals in the 2020 elections (e.g. campaign staff, influencers, local election officials)?

Join this panel to learn more about:
- Why attackers are focusing on identities
- SIM swap attacks and two-factor authentication
- Phishing - most commonly used for SIM swapping
- Other ways attackers can get the victim's info
- What can be done to protect digital identities
- Early SIM-swapping attack warning signs

This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.

Is your organization aware of the main differences in data regulations around the world?

Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

Viewers will learn more about:
- What's new on the data privacy and compliance landscape
- Main differences between data regulations around the world and what this means for your organization
- Expert recommendations regarding best tools and practices for achieving and maintaining compliance
- The future of data privacy
- What to expect in 2020 and beyond

There have been countless insider threat breaches recently, it’s no surprise that research suggests that up to 60% of cyberattacks are due to insider threats. With so much at stake, it's vital for organizations to protect against insider threats.

Join this interactive panel of industry experts as they discuss:

- How to protect your organisation from insider threats
- Latest technologies and solutions
- Benefits of early and timely detection

As organizations’ business patterns evolve in the face of remote working, emails continue to constitute the connective tissue of companies globally. Over the past few months, cyber-criminals have consistently exploited this reliance on the inbox in a number of different ways.

Join Dan Fein, Darktrace’s Director of Email Security Products, as he deep dives into the threats organizations face in today’s ever-evolving digital environment: the decreasing lifespan of attack campaigns, the rise of fearware in phishing attacks, and the surge of domain creation. He will explore how technological advancements like offensive AI will be leveraged against organizations in the email environment, and how only cyber defenses with a holistic understanding of the entire digital workforce can successfully detect and respond to such threats.

Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all CISO’s have to endure. During this webinar, a bank CISO with over 25 years of experience in the Financial Services industry will share his knowledge on how to build a successful program for various size organizations. This session will cover the GRC framework (Governance, Risk and Compliance) will blend with the Cybersecurity framework (Identify, Protect, Detect, Respond and Recover) creating a unique formula for success.

Alex Leon is the CISO at Dime Community Bank, a $6 Billion institution located in Brooklyn, New York. Alex has over 25 years of experience working in the Financial Services industry, including 18 years at Citibank and 4 years at Mitsubishi UFJ Trust and Banking. He has experience working in all 3 Lines of Defense (IT/IS, Risk, Audit). He has some of the most recognized Information Security certifications such as: C|CISO, CISSP, CISM, CISA, CRISC, CGEIT, CBCP, CTPRP and CSX-f. Alex has a Master of Science in IT Management from Colorado Technical University; and also earned a CISO Executive Program Certification from Carnegie Mellon University’s Heinz College of Information Systems and Policy. He is a Cybersecurity Advisory Board Member at Rutgers University, New Jersey. Alex is the first CISO at Dime Community Bank and reports directly to the Chief Risk Officer. He briefs the Bank’s Board of Directors at least quarterly. In his free time he shares his knowledge and industry experience with those entering the cybersecurity field. He is a Learning Tree Cybersecurity Instructor and enjoys skydiving during the summer months.

Crippling ransomware attacks are on the rise and U.S. cities are falling victim at alarming rates. The public sector is especially vulnerable because state and local governments tend to have outdated computer systems and maintain sensitive data which is highly desirable to attackers.

Join this episode of the Election Hacking series to learn more about the ransomware threat to state and local governments and what this means for the 2020 U.S. presidential election.
- The year of ransomware
- How cities and states are coping with the scourge of ransomware
- The ransomware dilemma: Pay the ransom or fight the infection
- How AI is enabling - and helping fight - ransomware attacks
- Ransomware as a threat to democracy

This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.

Smaller businesses have a common problem when it comes to cybersecurity - limited expertise, resources and budget.

The board is asking for, clients are demanding to know whether the company is secure, IT team can't articulate the cybersecurity program, because there isn't one.

Cybersecurity is sometimes an afterthought for a start-up, or delegated to one engineer. There's a tendency to think of cybersecurity as a set of tactical, technical implementations to cover obvious threats rather than a business problem.

We'll discuss the role of the CISO in terms of providing the leadership and strategy for a cohesive, risk based program. Ideally, the role is not a technician.

With an ever-evolving threat landscape and a growing business, where does a business start to build and maintain an affordable program? We'll discuss a baseline program, technologies required, focusing on fewest technologies for maximum benefit.

This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.

In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
- Risk scoring and security controls
- How to identify risks for organizations and their third-party vendors
- How to prevent, detect, and respond to, privacy and network security incidents
- Best of vulnerability and risk management in a multi-vendor environment
- Best practices and use cases across industries

As threats and attacks evolve, many organizations find that traditional methods and products are limited in their scope and effectiveness. Compounding the problem, the growing cybersecurity skills shortage means many companies don’t have a dedicated team that can view and respond to threats 24/7 or support their growing remote workforce. Join us on May 7th to stay engaged and connected on the 3 fundamental flaws of threat hunting in this new day and age.

As the United States enters a new phase in Covid-19 response, how are businesses and governments responding? What lessons have been learned, and what next steps are organizations taking? How can technology and cybersecurity mistakes be avoided?

Join this webinar for the latest coronavirus playbook roundup and recommendations on how to address the next phase of the outbreak. Learn the scope of the unprecedented challenges organizations are currently facing. Hear from industry leaders on how they are addressing the COVID-19 security and technology challenges.

By popular demand, this webinar is a follow-up to the immensely successful BrightTALK session held on March 13 at the beginning of this emergency. That webcast (link in Attachments): Coronavirus Actions and Risks for Tech and Security Leaders, was viewed thousands of times, and numerous attendees asked for this update.

Topics will include:
- Policy, technology and process steps to take today to protect your workforce and organization.
- Lessons learned from more staff working from home (telework)?
- What mistakes can be avoided as staff prepare to go back to offices –and how?

With the 2020 U.S. presidential election on the horizon, what are the biggest cybersecurity threats our democracy is facing? How well is the election infrastructure prepared when it comes to cybersecurity, and what are some steps to take today to strengthen the security posture?

Join this panel to learn more about:
- The current government threat landscape
- Which threats can we expect to see in the next few months?
- Why visibility into the security posture of election infrastructure is key
- What's needed to ramp up security quickly?
- Recommendations for enhancing election security

This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.

Learn how to find peace and happiness within you and around you amidst chaos and understanding how the mind-body-energy connection plays a crucial role in the world of Cyber. Mental health and wellness can be the difference between a Cyber professional and a criminal.

As the economy begins to recover over the next several months, information security leaders will be asked to make cuts. The extent of those cuts remain to be seen, but you should already be thinking about how you'll continue to get results with less budget and a smaller team. In this panel discussion, industry veterans David Levine, CISO at Ricoh, and John Shaffer, CIO at Greenhill & Co. will cover:
-Tips on leading Infosec team through the crisis
-How to prioritize your team’s efforts
-How to demonstrate return on effort/spend to C-Suite & BOD
-When forced to cut spending, what goes first

Digital transformation - we hear about it all the time, but what does it really mean for security? As organizations transition users, applications, workloads, and data from on-premise into the cloud to improve agility and competitiveness - how does that change their security landscape and threat model? And how can organizations address the challenge of protecting both legacy on-premise systems, while at the same time, also having to secure dynamic multi-cloud-based environment?

Join today's episode to learn about the reality many organizations are facing when it comes to juggling on prem and multi-cloud security, what the key differences are and how to address them for your organization. The panel will also discuss the following topics:

- What are the differences between Cloud Security vs On-Premise Security and why do they matter for organizations in 2020?
- Can we normalize our security posture across the legacy and hybrid/multi-cloud environments?
- Is it possible to improve security as part of a digital transformation program?
- What kind of cyber hygiene do we need to practice? What should be added and what can be taken off security teams' plates?
- Where does DevOps (or DevSecOps) fit into all of this?
- Are cloud security failures the customer's fault?
- What is SASE and how will it impact your organization?

This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.